Unit 6 Protection and Security
Unit 6 Protection and Security
Introduction
Protection and security requires that
computer resources such as CPU, software,
memory etc. are protected.
This extends to the operating system as well
as the data in the system.
This can be done by ensuring integrity,
confidentiality and availability in the
operating system.
The system must be protect against
unauthorized access, viruses, worms etc.
Confidentiality
means that your information can be seen only by
you and those that you want to see the
information.
Integrity
involves making sure that your information
cannot be changed or removed without your
authorization.
Availability
Ensures that you can get to your information
when you need it.
Need for security
Security of a computer system is a crucial task. It is
a process of ensuring confidentiality and integrity of
the OS.
Security refers to providing a protection system to
computer system resources such as CPU, memory,
disk, software programs and most importantly
data/information stored in the computer system.
If a computer program is run by an unauthorized
user, then he/she may cause severe damage to
computer or data stored in it.
So a computer system must be protected against
unauthorized access, malicious access to system
memory, viruses, worms etc.
Program Threats
Operating system's processes and kernel do
the designated task as instructed.
If a user program made these process do
malicious tasks, then it is known as Program
Threats.
One of the common example of program
threat is a program installed in a computer
which can store and send user credentials via
network to some hacker.
Following is the list of some well-known program
threats.
Virus − Virus as name suggest can replicate themselves
on computer system. They are highly dangerous and can
modify/delete user files, crash systems. A virus is generally
a small code embedded in a program. As user accesses the
program, the virus starts getting embedded in other files/
programs and can make system unusable for user
Trojan Horse − Such program traps user login
credentials and stores them to send to malicious user who
can later on login to computer and can access system
resources.
Trap Door − If a program which is designed to work as
required, have a security hole in its code and perform
illegal action without knowledge of user then it is called to
have a trap door.
Logic Bomb − Logic bomb is a situation when a program
misbehaves only when certain conditions met otherwise it
works as a genuine program. It is harder to detect.
System and Network Threats